Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 414 discussion

Actual exam question from ISC's CISSP
Question #: 414
Topic #: 1
[All CISSP Questions]

The client of a security firm reviewed a vulnerability assessment report and claims the report is inaccurate. The client states that the vulnerabilities listed are not valid because the host’s operating system (OS) was not properly detected. Where in the vulnerability assessment process did the error MOST likely occur?

  • A. Report writing
  • B. Detection
  • C. Enumeration
  • D. Scanning
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Cyberjerry
6 months, 2 weeks ago
Selected Answer: D
Vulnerability discovery starts with scanning and there are many factors that can affect the result from a scanning website. Credential/ non credeantial/ agentbase / agentless/ active san and the rest.
upvoted 1 times
...
GuardianAngel
9 months, 2 weeks ago
Answer: Detection Detection is the process of identifying and determining the presence of hosts or systems on a network. In this case, the client claims that the host's operating system (OS) was not properly detected. As a result, the vulnerabilities listed in the report may not be accurate because they could be based on incorrect information about the host's OS. To perform an accurate vulnerability assessment, it is crucial to correctly identify and detect the hosts and their operating systems. This information is essential for accurately identifying vulnerabilities and determining the appropriate security measures. If the detection process fails to correctly identify the host's OS, it can lead to inaccurate vulnerability assessments and reports. The vulnerabilities listed may not be valid for the host's actual operating system, leading to potential misunderstandings or false assumptions about the security posture.
upvoted 1 times
...
gjimenezf
9 months, 3 weeks ago
Selected Answer: D
Scanning: Identify OS, open ports, etc Enumeration: Enumerate, accounts, services found Detection: Define vulnerabilities found CVE... Report: Write findings
upvoted 1 times
...
gjimenezf
9 months, 3 weeks ago
Scanning: Identify OS, open ports, etc Enumeration: Enumerate, accounts, services found Detection: Define vulnerabilities found CVE... Report: Write findings
upvoted 1 times
...
GPrep
10 months, 2 weeks ago
Selected Answer: D
D - per this site (https://www.intruder.io/guides/vulnerability-assessment-made-simple-a-step-by-step-guide) and a few others I've found, detection is NOT the name of a phase in the vulnerability assessment process (technicality).
upvoted 2 times
...
Soleandheel
11 months, 1 week ago
B. Detection
upvoted 1 times
...
xxxBadManxxx
11 months, 2 weeks ago
Selected Answer: B
Detection involves identifying and recognizing the existence of systems, devices, or hosts on a network, including their attributes and characteristics such as the operating system. In this scenario, if the host's operating system was not properly detected, it could lead to inaccuracies in the vulnerability assessment report. The vulnerabilities reported might be incorrect or irrelevant if they were based on an incorrect or incomplete understanding of the operating system running on the host. Accurate detection of the operating system is crucial for properly assessing and identifying vulnerabilities specific to that OS.
upvoted 1 times
...
[Removed]
11 months, 3 weeks ago
Selected Answer: B
I think B B is include D
upvoted 1 times
...
DapengZhang
11 months, 3 weeks ago
Selected Answer: B
For sure it is B, there is no scanning in vulnerabilities management flow but detection. quoted from OSG9 P742. Vulnerability Management Workflow Organizations that adopt a vulnerability management system should also develop a workflow approach to managing vulnerabilities. The basic steps in this workflow should include the following: 1. Detection: The initial identification of a vulnerability normally takes place as the result of a vulnerability scan. 2. Validation: Once a scanner detects a vulnerability, administrators should confirm the vulnerability to determine that it is not a false positive report. 3. Remediation: Validated vulnerabilities should then be remediated. This may include applying a vendor-supplied security patch, modifying a device configuration, implementing a workaround to avoid the vulnerability, or installing a web application firewall or other control that prevents the exploitation of the vulnerability.
upvoted 1 times
...
Jacobmy98
1 year, 3 months ago
Selected Answer: B
detection includes scanning
upvoted 1 times
...
FlimFlam
1 year, 8 months ago
Selected Answer: D
Scanning is part of a vulnerability assessment.
upvoted 2 times
jackdryan
1 year, 6 months ago
D is correct
upvoted 1 times
...
...
Alex71
1 year, 9 months ago
Selected Answer: D
The error most likely occurred in the scanning phase of the vulnerability assessment process, where the host's operating system was not properly detected. The accuracy of the vulnerability assessment report heavily depends on the quality of the scanning process, and if the scanning tool used was unable to detect the operating system, it might have failed to identify vulnerabilities specific to that operating system. Therefore, it is essential to ensure that the scanning tool used is capable of properly identifying the host operating system.
upvoted 4 times
...
Rollingalx
1 year, 9 months ago
I go with D Detection is a possible answer as the accuracy of the vulnerability assessment report depends on the correct detection of systems and applications in the environment. However, the detection phase typically refers to the initial discovery of systems and applications in the environment, which is usually performed using network scanning tools or manual reconnaissance techniques. In this case, the client is specifically referring to the OS of a host which would typically be identified during the scanning phase not the detection phase.
upvoted 3 times
Rollingalx
1 year, 8 months ago
Sorry, I meant B is correct
upvoted 4 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...